Unrated severityNVD Advisory· Published May 7, 2024· Updated Nov 3, 2025
Suricata 's http2 parser contains an improper compressed header handling can lead to resource starvation
CVE-2024-32663
Description
Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine. Prior to 7.0.5 and 6.0.19, a small amount of HTTP/2 traffic can lead to Suricata using a large amount of memory. The issue has been addressed in Suricata 7.0.5 and 6.0.19. Workarounds include disabling the HTTP/2 parser and reducing app-layer.protocols.http2.max-table-size value (default is 65536).
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
7- github.com/OISF/suricata/commit/08d93f7c3762781b743f88f9fdc4389eb9c3eb64mitrex_refsource_MISC
- github.com/OISF/suricata/commit/c0af92295e833d1db29b184d63cd3b829451d7fdmitrex_refsource_MISC
- github.com/OISF/suricata/commit/d24b37a103c04bb2667e449e080ba4c8e56bb019mitrex_refsource_MISC
- github.com/OISF/suricata/commit/e68ec4b227d19498f364a41eb25d3182f0383ca5mitrex_refsource_MISC
- github.com/OISF/suricata/security/advisories/GHSA-9jxm-qw9v-266rmitrex_refsource_CONFIRM
- redmine.openinfosecfoundation.org/issues/6892mitrex_refsource_MISC
- redmine.openinfosecfoundation.org/issues/6900mitrex_refsource_MISC
News mentions
0No linked articles in our index yet.